Description
Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG files.(Citation: Trustwave SVG Smuggling 2025) SVGs, or Scalable Vector Graphics, are vector-based image files constructed using XML. As such, they can legitimately include tags that enable adversaries to include malicious JavaScript payloads. However, SVGs may appear less suspicious to users than other types of executable files, as they are often treated as image files.
SVG smuggling can take a number of forms. For example, threat actors may include content that:
Assembles malicious payloads(Citation: Talos SVG Smuggling 2022) Downloads malicious payloads(Citation: Cofense SVG Smuggling 2024) Redirects users to malicious websites(Citation: Bleeping Computer SVG Smuggling 2024) Displays interactive content to users, such as fake login forms and download buttons.(Citation: Bleeping Computer SVG Smuggling 2024)
SVG Smuggling may be used in conjunction with HTML Smuggling where an SVG with a malicious payload is included inside an HTML file.(Citation: Talos SVG Smuggling 2022) SVGs may also be included in other types of documents, such as PDFs.
Platforms
Mitigations (1)
Application Isolation and SandboxingM1048
Browser sandboxes can be used to mitigate some of the impact of exploitation, but sandbox escapes may still exist.
References
- Adam Katz and Jaeson Schultz. (2022, December 13). HTML smugglers turn to SVG images. Retrieved March 25, 2025.
- Bernard Bautista and Kevin Adriano. (2025, April 10). Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks. Retrieved April 14, 2025.
- Lawrence Abrams. (2024, November 17). Phishing emails increasingly use SVG attachments to evade detection. Retrieved March 25, 2025.
- Max Gannon. (2024, March 13). SVG Files Abused in Emerging Campaigns. Retrieved March 25, 2025.
Frequently Asked Questions
What is T1027.017 (SVG Smuggling)?
T1027.017 is a MITRE ATT&CK technique named 'SVG Smuggling'. It belongs to the Stealth tactic(s). Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG files.(Citation: Trustwave SVG Smuggling 2025) SVGs, or Scalable Vector Graphics...
How can T1027.017 be detected?
Detection of T1027.017 (SVG Smuggling) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.
What mitigations exist for T1027.017?
There are 1 documented mitigations for T1027.017. Key mitigations include: Application Isolation and Sandboxing.
Which threat groups use T1027.017?
While specific threat group attribution may vary, this technique has been observed in various real-world attacks. Check the MITRE ATT&CK website for the latest threat intelligence.